US11502831B2 - Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system - Google Patents

Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system Download PDF

Info

Publication number
US11502831B2
US11502831B2 US16/331,685 US201716331685A US11502831B2 US 11502831 B2 US11502831 B2 US 11502831B2 US 201716331685 A US201716331685 A US 201716331685A US 11502831 B2 US11502831 B2 US 11502831B2
Authority
US
United States
Prior art keywords
key
data
optical pulses
train
data sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US16/331,685
Other versions
US20190245685A1 (en
Inventor
Ken-ichiro Yoshino
Mikio Fujiwara
Masahide Sasaki
Akihisa Tomita
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hokkaido University NUC
NEC Corp
National Institute of Information and Communications Technology
Original Assignee
Hokkaido University NUC
NEC Corp
National Institute of Information and Communications Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hokkaido University NUC, NEC Corp, National Institute of Information and Communications Technology filed Critical Hokkaido University NUC
Assigned to NEC CORPORATION, NATIONAL UNIVERSITY CORPORATION HOKKAIDO UNIVERSITY, NATIONAL INSTITUTE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY reassignment NEC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TOMITA, AKIHISA, YOSHINO, KEN-ICHIRO, SASAKI, MASAHIDE, FUJIWARA, MIKIO
Publication of US20190245685A1 publication Critical patent/US20190245685A1/en
Application granted granted Critical
Publication of US11502831B2 publication Critical patent/US11502831B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/508Pulse generation, e.g. generation of solitons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/516Details of coding or modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J7/00Multiplex systems in which the amplitudes or durations of the signals in individual channels are characteristic of those channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

Definitions

  • This invention relates to a transmitting device, a receiving device, a quantum key distribution method, and a quantum key distribution program for a quantum key distribution system.
  • Non-Patent Document 1 Quantum Key Distribution, QKD
  • Non-Patent Document 1 proposes to use a single-photon light source as a light source for the QKD.
  • the single-photon light source is on the road to development and does not reach a practical level. Therefore, as a substitute for the single-photon light source, the mainstream is a method of using, as a pseudo-single-photon light source, a laser light source having a weakened intensity obtained by extremely weakening an intensity of a general laser light source.
  • Non-Patent Document 2 In a case of the laser light source, which is different from an ideal single-photon light source, two or more photons are generated in one pulse at a constant probability. As a result, there is a possibility of being subjected to an eavesdropping attack called a photon number splitting attack (Photon Number Splitting attack, PNS attack) in which information corresponding to one photon is eavesdropped from two or more photons. Therefore, it is pointed out that, in a case where the laser light source is used, safety of the QKD is significantly detracted (Non-Patent Document 2).
  • PNS attack Photon Number Splitting attack
  • Non-Patent Document 3 a decoy method is proposed (Non-Patent Document 3).
  • s, d, and v represent average photon numbers contained per one pulse in optical pulses of the three types of optical intensities, respectively.
  • s is equal to about 0.5 [photons/pulse] in a case of a typical QKD system for 50 km transmission.
  • d is equal to about 40% of s, namely, d is equal to about 0.2 and v is equal to 0 (vacuum).
  • optical pulses of the average photon number s are used as signal lights and information obtained from the signal lights is used as a quantum encryption key.
  • the optical pulses of the average photon numbers d and v are used as decoy lights (which may also be called decoy pulses) for detecting the eavesdropping.
  • optical pulses having the largest intensity among the three types of the optical pulses are used as the signal lights.
  • optical pulses of the average photon number s (d or v) will simply be represented as S (D or V).
  • S optical pulses of the average photon number s (d or v)
  • D transmission pulses
  • V V
  • FIG. 1 is a schematic view showing an example of a train of optical pulses transmitted in the decoy method.
  • the train of optical pulses comprises S as a large number of signal lights and V and D as a small number of decoy pulses.
  • the decoy method In a case where the decoy method is used in the quantum key distribution, it is known that, when the intensity of the optical pulses fluctuates, an amount of information leakage to an eavesdropper increases and a generation efficiency of an encryption key significantly degrades. Specifically, when the intensity of the decoy pulses D fluctuates by 5%, the generation efficiency of the encryption key degrades to about 50% in comparison with a case of no fluctuation in the decoy pulses D.
  • a recent quantum key distribution system uses a high-speed electronic circuit operable with a clock frequency exceeding 1 GHz. Since a distortion occurs in a waveform of a modulation signal, a phenomenon called a pattern effect occurs.
  • the pattern effect is a phenomenon in which a modulation signal for a pulse changes depending on a previous modulation pattern.
  • FIG. 2 is a schematic view for use in describing the pattern effect, (a) shows a modulation signal in an ideal electronic circuit without the pattern effect, and (b) shows a modulation signal in a real electronic circuit with the pattern effect.
  • the axis of abscissas represents a time while the axis of ordinate represents a voltage.
  • FIG. 2 ( a ) illustrates a modulation signal 201 a , a first optical pulse 202 a and a second optical pulse 203 a as optical pulses to be modulated, a first modulation signal 204 a for the first optical pulse 202 a , and a second modulation signal 205 a for the second optical pulse 203 a .
  • the first modulation signal 204 a and the second modulation signal 205 a have waveforms of the same shape as each other.
  • FIG. 2 ( b ) illustrates a modulation signal 201 b , a first optical pulse 202 b and a second optical pulse 203 b as optical pulses to be modulated, a first modulation signal 204 b for the first optical pulse 202 b , and a second modulation signal 205 b for the second optical pulse 203 b .
  • distortion occurs in the modulation signal 201 b due to band limitation of wiring and so on.
  • the modulation signal 204 b and the second modulation signal 205 b as respective modulation signals thereof have waveforms which are different from each other.
  • the modulation signal changes depending on a preceding modulation pattern.
  • Such phenomenon is called the pattern effect.
  • the intensity may fluctuate depending on which one of the three types has been a preceding pulse intensity.
  • the fluctuation of the optical pulse intensity due to the pattern effect may reach about 20%. Therefore, a generation efficiency of the encryption key may possibly degrade significantly.
  • a transmitting device for a quantum key distribution system comprises an encoding unit configured to encode a train of optical pulses; an intensity modulating unit configured to subject a train of encoded optical pulses to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three; and a first key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when the encoding unit and the intensity modulating unit carry out encoding and intensity modulation.
  • a receiving device for a quantum key distribution system comprises a decoding unit configured to receive, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, the decoding unit producing a data sequence obtained by decoding the train of optical pulses; and a second key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
  • a quantum key distribution method comprises generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
  • a quantum key distribution method comprises receiving, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, to produce a data sequence obtained by decoding the train of optical pulses, and generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
  • a quantum key distribution program makes a computer function as means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
  • a quantum key distribution program makes a computer function as means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence obtained by decoding a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three.
  • FIG. 1 is a schematic view for illustrating one example of a train of optical pulses transmitted according to a decoy method:
  • FIG. 2 is a schematic view for use in describing a pattern effect, (a) shows a modulation signal of an ideal electronic circuit, and (b) shows a modulation signal of a real electronic circuit;
  • FIG. 3 is a block diagram for use in explaining a concept of a quantum key distribution device of the present invention
  • FIG. 4 is a block diagram for use in explaining a concept of a quantum key distribution system of the present invention.
  • FIG. 5 is a block diagram for illustrating a configuration of a quantum key distribution system according to an example embodiment of the present invention
  • FIG. 6 is a table for illustrating an intensity, an intensity ratio, and a mixing percentage of a signal light and decoy pulses according to the example embodiment of the present invention
  • FIG. 7 is a block diagram for illustrating configurations of key distillation processing units according to the example embodiment of the present invention, (a) shows a key distillation processing unit provided in a transmission-side quantum key distribution device, and (b) shows a key distillation processing unit provided in a reception-side quantum key distribution device:
  • FIG. 8 is a flow chart for illustrating a flow of processing up to generation of an encryption key according to the example embodiment of the present invention:
  • FIG. 9 is a table for illustrating an example of a pattern disposal processing method according to the example embodiment of the present invention.
  • FIG. 10 is a block diagram for illustrating a configuration of an information processing apparatus configuring the key distillation processing unit according to the example embodiment of the present invention.
  • FIG. 3 is a block diagram for illustrating a configuration of a transmitting device 10 in a quantum key distribution system for use in explaining the concept of the present invention.
  • the transmitting device 10 comprises an encoding unit 11 , an intensity modulating unit 12 , and a key distillation processing unit 13 .
  • the encoding unit 11 encodes optical pulses according to a quantum key distribution protocol, for example, BB84.
  • the intensity modulating unit 12 subjects a train of optical pulses encoded by the encoding unit 10 to N types of intensity modulation having mutually different intensities, to deliver outputs to the key distillation processing unit 13 , where N represents an integer which is not less than three.
  • the intensity modulating unit 12 applies intensity modulation to the optical pulses in accordance with the decoy method.
  • the key distillation processing unit 13 generates an encryption key on the basis of a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used on encoding by the encoding unit 11 and a data sequence used in the intensity modulating unit 12 .
  • the transmitting device 10 can suppress degradation of a generation efficiency of an encryption key when the decoy method is used in the quantum key distribution system.
  • FIG. 4 is block diagram for illustrating a configuration of a quantum key distribution system 30 for use in explaining the concept of the present invention.
  • the quantum key distribution system 30 comprises a transmitting device 10 A and a receiving device 20 .
  • the transmitting device 10 A comprises the encoding unit 11 , the intensity modulating unit 12 , and a first key distillation processing unit 13 A.
  • the transmitting device 10 A subjects the optical pulses to processing similar to that in the above-mentioned transmitting device 10 .
  • the receiving device 20 comprises a decoding unit 21 and a second key distillation processing unit 22 .
  • the decoding unit 21 and the intensity modulating unit 12 are connected via an optical network 40 .
  • Such an optical network 40 may comprise an optical fiber or the like.
  • the decoding unit 21 receives, via the optical network 40 , the train of optical pulses which has been encoded and subjected to the intensity modulation and decodes the train of optical pulses.
  • the second key distillation processing unit 22 and the first key distillation processing unit 13 A are connected via a communication network 50 .
  • Such a communication network 50 may comprise a normal Internet network or the like.
  • the first key distillation processing unit 13 A and the second key distillation processing unit 22 carry out, via the transmission network 50 , transmission and reception of necessary information for generating the encryption key.
  • the necessary information for generating the encryption key comprises information related to random number data used when the train of optical pulses is subjected to the encoding and the intensity modulation, information related to a basis used for measurement of the train of optical pulses, and the like. Consequently, the second key distillation processing unit 22 receives, from the first key distillation processing unit 13 A, the necessary information for generating the encryption key.
  • the second key distillation processing unit 22 generates, based on the information received from the decoding unit 21 and the information received from the first key distillation processing unit 13 A, the encryption key on the basis of a data sequence obtained by removing data obtained from the optical pulses having the specific modulation pattern from a data sequence of a train of optical pulses which has been decoded by the decoding unit 21 .
  • FIG. 5 is a block diagram for illustrating a configuration of the quantum key distribution system according to an example embodiment of the present invention.
  • the quantum key distribution system 100 comprises a transmitting device 110 and a receiving device 120 .
  • Each of unidirectional arrows in FIG. 5 simply depicts a direction of flow of a signal (data) without excluding bidirectionality.
  • the transmitting device 110 comprises an optical source unit 111 , an encoding unit 112 , a decoy modulating unit 113 , an optical attenuating unit 114 , and a first key distillation processing unit 115 .
  • the optical source unit 111 comprises, for example, a semiconductor laser and supplies the encoding unit 112 with optical pulses having any desired wavelength and intensity.
  • the encoding unit 112 encodes the optical pulses supplied from the optical source unit 111 in accordance with the quantum key distribution protocol.
  • the quantum key distribution protocol comprises, for example, a BB84 protocol.
  • the encoding unit 112 comprises, for example, a Mach-Zehnder interferometer and a phase modulator.
  • the decoy modulating unit 113 subjects the optical pulses received from the encoding unit 112 to the total three types of intensity modulation having mutually different intensities of a signal light S, a decoy pulse D and a decoy pulse V to produce a train of optical pulses comprising a plurality of optical pulses which have been subjected to the intensity modulation.
  • an LN (Lithium Niobate) intensity modulator comprising a combination of a Mach-Zehnder interferometer and a phase modulator may be used.
  • FIG. 6 is a table showing an example of the intensity, the intensity ratio, and the mixing percentage of each of S, D, and V according to the example embodiment.
  • S has the intensity of 1.
  • D and V have the intensities of 0.4 and 0, respectively.
  • the train of optical pulses includes S at a percentage of 90%, D at a percentage of 5%, and V at a percentage of 5%. That is, in the example embodiment, 90% of the train of optical pulses is used as the signal light while remaining 10% thereof is used as the decoy pulses.
  • the intensity, the intensity ratio, and the mixing percentage of each of S, D, and V shown in FIG. 6 are one example, and the present invention is not limited thereto.
  • the optical attenuating unit 114 attenuates the train of optical pulses supplied from the decoy modulating unit 113 to a suitable optical intensity in order to transmit the train of the optical pulses to the receiving device 120 .
  • Such an optical attenuating unit 114 may comprise, for example, a variable optical attenuator.
  • An attenuation amount in the optical attenuating unit 114 is preliminarily set according to a design of the quantum key distribution system 100 but may be adjusted appropriately.
  • the optical attenuating unit 114 may comprise, for example, an optical detecting unit. In this event, the optical attenuating unit 114 may adjust the attenuation amount in accordance with an intensity of pulses detected by the optical detecting unit.
  • the first key distillation processing unit 115 generates a first encryption key 150 a as an encryption key in the transmitting device 110 .
  • the first key distillation processing unit 115 receives, from the encoding unit 112 and the decoy modulating unit 113 , information (random number data or the like) used on encoding and on the intensity modulation, respectively.
  • information random number data or the like used on encoding and on the intensity modulation, respectively.
  • the receiving device 120 comprises a decoding unit 121 , an optical detecting unit 122 , and a second key distillation processing unit 123 .
  • the decoding unit 121 and the optical attenuating unit 114 of the transmitting device 110 are connected via an optical network 130 which comprises an optical fiber or the like.
  • the second key distillation processing unit 123 and the first key distillation processing unit 115 of the transmitting device 110 are connected via a communication network 140 such as a normal Internet network.
  • the decoding unit 121 receives the train of optical pulses from the transmitting device 110 via the optical network 130 and decodes the train of optical pulses through a process inverse to the method used on encoding by the encoding unit 112 .
  • the optical detecting unit 122 measures information of a photon number with respect to the train of optical pulses which has been received and delivers measured data to the second key distillation processing unit 123 .
  • the second key distillation processing unit 123 generates a second encryption key 150 b as an encryption key in the receiving device 120 .
  • the second encryption key 150 b is the same encryption key as the first encryption key 150 a generated by the first key distillation processing unit 115 .
  • a configuration of the second key distillation processing unit 123 and processing for generating the second encryption key 150 b will later be described.
  • the first key distillation processing unit 115 generates a sifted key based on random number data used on the encoding and the decoy modulation of the optical pulses.
  • the second key distillation processing unit 123 generates a sifted key based on detected data detected by the optical detecting unit 122 after decoding.
  • the first key distillation processing unit 115 and the second key distillation processing unit 123 generate the first encryption key 150 a and the second encryption key 150 b , each of which is finally safe, respectively, by subjecting the sifted key to error correction and privacy amplification.
  • the first key distillation processing unit 115 and the second key distillation processing unit 123 mutually transmit and receive, via the communication network 140 , the necessary information, possessed by the respective units, for generating the encryption key.
  • the quantum key distribution system generates the encryption key based on the sifted key which is generated in accordance with a result obtained by verifying a basis selected at a transmitting side and a receiving side.
  • this example embodiment is characterized by further performing, after generating the sifted key in accordance with the result obtained by verifying the basis, processing in which data obtained from the optical pulses of a specific modulation pattern are disposed of from the sifted key without being used for generating the encryption key (pattern disposal processing).
  • FIG. 7 is a block diagram for illustrating configurations of key distillation processing units according to the example embodiment of the present invention.
  • (a) shows the configuration of the first key distillation processing unit 115
  • (b) shows the configuration of the second key distillation processing unit 123 .
  • Each of unidirectional arrows in FIG. 7 simply depicts a direction of flow of a signal (data) without excluding bidirectionality.
  • the first key distillation processing unit 115 comprises a first basis verifying portion 115 a , a first pattern disposal processing portion 115 b , and a first encryption key generating portion 115 c .
  • the second key distillation processing unit 123 comprises a second basis verifying portion 123 a , a second pattern disposal processing portion 123 b , and a second encryption key generating portion 123 c.
  • FIG. 8 is a flow chart for illustrating a flow of processing in which the first key distillation processing unit 115 and the second key distillation processing unit 123 according to the example embodiment generate the encryption keys.
  • the first basis verifying portion 115 a and the second basis verifying unit portion 123 a transmit and receive information of the bases used by these portions, respectively.
  • Each of the first basis verifying portion 115 a and the second basis verifying portion 123 a generates a first sifted key in accordance with a result obtained by verifying the basis (step S 101 ).
  • the first pattern disposal processing portion 115 b and the second pattern disposal processing portion 123 b generate a second sifted key by subjecting the first sifted key to the pattern disposal processing (step S 102 ).
  • the second key distillation processing unit 123 receives, from the first key distillation processing unit 115 via the communication network 140 , decoy information (random number data) used when the decoy modulating unit 113 carries out the intensity modulation.
  • the second pattern disposal processing portion 123 b can subject the first sifted key to processing similar to that in the first pattern disposal processing portion 115 b and can generate the second sifted key.
  • FIG. 9 is a table showing an example of the optical pulses to which the pattern disposal processing is applied.
  • D ⁇ S means the signal light S which is transmitted immediately after the decoy pulse D.
  • the decoy pulse D (S ⁇ D) transmitted immediately after the signal light S is used while the decoy pulses D (D ⁇ D and V ⁇ D) transmitted immediately after the decoy pulse D and the decoy pulse V are disposed of without being used. Consequently, any signal immediately before the decoy pulse D is fixed to the signal light S. Therefore, it is possible to substantially remove the influence of the pattern effect even if the pattern effect of the decoy pulse D is large. This is because the modulation signal changes in dependence upon the preceding modulation pattern due to the pattern effect as described above.
  • the first encryption key generating portion 115 c calculates an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key (step S 103 ). Specifically, the first encryption key generating portion 115 c receives, via the communication network 140 , information of at least a part of the second sifted key generated by the second pattern disposal processing portion 123 b . Then, the first encryption key generating portion 115 c calculates the error rate by comparing the second sifted keys which are generated at the transmitting side and the receiving side.
  • QBER Quantum Bit Error Rate
  • first encryption key generating portion 115 c and the second encryption key generating portion 123 c generate safe encryption keys by subjecting the second sifted keys to the error correction and the privacy amplification based on the error rate.
  • the present invention is not limited thereto.
  • the encryption key may be generated by verifying the basis after carrying out the pattern disposal processing.
  • the number of acquired data decreases because the pattern disposal processing portions dispose of a part of pulses.
  • the present invention is not limited to the decoy method using three types of intensities, but may be applicable to a case where four or more types of intensities are used.
  • the present invention is not limited to only the pattern effect due to preceding modulation, but may be applicable to a case where the pattern effect occurs due to second or more preceding modulation or due to first or more succeeding modulation.
  • the present invention may be applicable to a case where there are a current optical pulse and the pattern effect due to modulation occurs on an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M represents an integer which is not less than one.
  • the first key distillation processing unit 115 and the second key distillation processing unit 123 may be implemented by hardware or may be implemented by software.
  • the first key distillation processing unit 115 and the second key distillation processing unit 123 may be implemented by a combination of hardware and software.
  • FIG. 10 is one example of an information processing apparatus (computer) constituting the first key distillation processing unit 115 and the second key distillation processing unit 123 .
  • the information processing apparatus 300 comprises a control unit 310 , a storage device 320 , an ROM (Read Only Memory) 330 , an RAM (Random Access Memory) 340 , and a communication interface 350 .
  • ROM Read Only Memory
  • RAM Random Access Memory
  • the control unit 310 may comprise a processing unit such as a CPU (Central Processing Unit).
  • the control unit 310 may implement respective portions constituting the first key distillation processing unit 115 and the second key distillation processing unit 123 by developing a program, which is held in the storage device 320 or the ROM 330 and which is readable by the control unit 310 , in the RAM 340 and by executing the program.
  • the control unit 310 may comprise an internal buffer which is adapted to temporarily store data or the like.
  • the storage device 320 comprises a bulk storage medium which can hold various types of data and may be implemented by a storage medium such as a magneto-optical disc, an HDD (Hard Disk Drive), and an SSD (Solid State Drive).
  • the storage device 320 may be a cloud storage existing in a communication network when the information processing apparatus 300 is connected to a communication network via the communication interface 350 .
  • the storage device 320 may hold the program readable by the control unit 310 .
  • the ROM 330 comprises a nonvolatile storage device which may comprise a flash memory having a small capacity as compared to the storage device 320 .
  • the ROM 330 may hold a program which is readable by the control unit 310 .
  • the program readable by the control unit 310 may be held in at least one of the storage device 320 and the ROM 330 .
  • the RAM 340 comprises a semiconductor memory such as a DRAM (Dynamic Random Access Memory) and an SRAM (Static Random Access Memory) and may be used as an internal buffer which temporarily stores data and so on.
  • DRAM Dynamic Random Access Memory
  • SRAM Static Random Access Memory
  • the communication interface 350 is an interface which connects the information processing apparatus 300 and the communication network via wire or wirelessly.
  • a transmitting device for a quantum key distribution system comprising:
  • an encoding unit configured to encode a train of optical pulses
  • an intensity modulating unit configured to subject a train of encoded optical pulses to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three;
  • a first key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when the encoding unit and the intensity modulating unit carry out encoding and intensity modulation.
  • the first key distillation processing unit is configured to determine data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
  • the transmitting device according to Supplementary Note 1 or 2, wherein the first key distillation processing unit includes a decoy pulse as the modulation pattern and is configured to dispose of data having large intensity fluctuation.
  • the transmitting device according to any one of Supplementary Notes 1 to 3, wherein the first key distillation processing unit is configured to dispose of at least data having the largest intensity fluctuation due to a pattern effect.
  • the first key distillation processing unit comprises a first basis verification processing portion, a first pattern disposal processing portion, and a first encryption key generating portion
  • the first basis verification processing portion is configured to generate a first sifted key based on a basis which is given to the data sequence of the train of optical pulses
  • the first pattern disposal processing portion is configured to generate a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern,
  • the first encryption key generating portion is configured to generate the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
  • QBER Quantum Bit Error Rate
  • a receiving device for a quantum key distribution system comprising:
  • a decoding unit configured to receive, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, the decoding unit producing a data sequence obtained by decoding the train of optical pulses:
  • a second key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
  • the second key distillation processing unit is configured to determine data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
  • the second key distillation processing unit includes a decoy pulse as the modulation pattern and is configured to dispose of data having large intensity fluctuation.
  • the receiving device according to any one of Supplementary Notes 6 to 8, wherein the second key distillation processing unit is configured to dispose of at least data having the largest intensity fluctuation due to a pattern effect.
  • the second key distillation processing unit comprises a second basis verification processing portion, a second pattern disposal processing portion, and a second encryption key generating portion
  • the second basis verification processing portion is configured to generate a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses,
  • the second pattern disposal processing portion is configured to generate a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern,
  • the second encryption key generating portion is configured to generate the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
  • QBER Quantum Bit Error Rate
  • a quantum key distribution method comprising generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
  • the quantum key distribution method comprising determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
  • the quantum key distribution method comprising including a decoy pulse as the modulation pattern: and disposing of data having large intensity fluctuation.
  • the quantum key distribution method comprising disposing of at least data having the largest intensity fluctuation due to a pattern effect.
  • generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
  • QBER Quantum Bit Error Rate
  • a quantum key distribution method comprising:
  • the quantum key distribution method comprising determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
  • the quantum key distribution method comprising including a decoy pulse as the modulation pattern; and disposing of data having large intensity fluctuation.
  • the quantum key distribution method according to any one of Supplementary Notes 16 to 18, comprising disposing of at least data having the largest intensity fluctuation due to a pattern effect.
  • generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
  • QBER Quantum Bit Error Rate
  • a quantum key distribution program for making a computer function as:
  • a quantum key distribution program for making a computer function as:
  • a quantum key distribution system comprising:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optics & Photonics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

A quantum key distribution device is provided with an encoding unit which encodes an optical pulse train; an intensity modulating unit which subjects the encoded optical pulse train to N (where N is an integer at least equal to 3) types of intensity modulation having mutually different intensities, with different timings; and a first key distillation processing unit which generates an encryption key on the basis of a data sequence obtained by removing data obtained from an optical pulse having a specific modulation pattern from a data sequence used by the encoding unit and the intensity modulating unit.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This Application is a National Stage of International Application No. PCT/JP2017/031456 filed Aug. 31, 2017, claiming priority based on Japanese Patent Application No. 2016-176364 filed Sep. 9, 2016, the disclosure of which is incorporated herein in its entirety by reference.
TECHNICAL FIELD
This invention relates to a transmitting device, a receiving device, a quantum key distribution method, and a quantum key distribution program for a quantum key distribution system.
BACKGROUND ART
In recent years, as a method for achieving encrypted communication having absolute safety against an eavesdropping action, quantum key distribution (Quantum Key Distribution, QKD) (Non-Patent Document 1) has been actively studied and developed for practical use.
Non-Patent Document 1 proposes to use a single-photon light source as a light source for the QKD. At the present stage, however, the single-photon light source is on the road to development and does not reach a practical level. Therefore, as a substitute for the single-photon light source, the mainstream is a method of using, as a pseudo-single-photon light source, a laser light source having a weakened intensity obtained by extremely weakening an intensity of a general laser light source.
However, in a case of the laser light source, which is different from an ideal single-photon light source, two or more photons are generated in one pulse at a constant probability. As a result, there is a possibility of being subjected to an eavesdropping attack called a photon number splitting attack (Photon Number Splitting attack, PNS attack) in which information corresponding to one photon is eavesdropped from two or more photons. Therefore, it is pointed out that, in a case where the laser light source is used, safety of the QKD is significantly detracted (Non-Patent Document 2).
Thus, as means for avoiding the PNS attack, a decoy method is proposed (Non-Patent Document 3). The decoy means a “lure” and the decoy method is a method which can detect presence or absence of the PNS attack by changing, at intervals, an intensity of optical pulses used in the QKD. It is considered that implementation of the decoy method is important in recent development of practical QKD.
In order to implement the decoy method into the QKD, it is necessary to use three or more types of optical intensities. It is known that, in the decoy method, the safety of the QKD is improved when a greater number of types of the intensities are used. However, taking the degree of difficulty of implementation into account, in general, the three types of optical intensities are frequently used in the decoy method. For that reason, description will hereinafter be made about the decoy method using the three types of optical intensities.
It is assumed that s, d, and v represent average photon numbers contained per one pulse in optical pulses of the three types of optical intensities, respectively. Herein, s is equal to about 0.5 [photons/pulse] in a case of a typical QKD system for 50 km transmission. d is equal to about 40% of s, namely, d is equal to about 0.2 and v is equal to 0 (vacuum). In this case, optical pulses of the average photon number s are used as signal lights and information obtained from the signal lights is used as a quantum encryption key. The optical pulses of the average photon numbers d and v are used as decoy lights (which may also be called decoy pulses) for detecting the eavesdropping. That is, in the decoy method, the optical pulses having the largest intensity among the three types of the optical pulses are used as the signal lights. Hereinafter, “optical pulses of the average photon number s (d or v)” will simply be represented as S (D or V). In the QKD system using the decoy method, most of transmission pulses are S and the eavesdropping is detected by mixing D and V as a part thereof. As a typical example, in the transmission pulses, S is about 90%, D is about 5%, and V is about 5%.
FIG. 1 is a schematic view showing an example of a train of optical pulses transmitted in the decoy method. As shown in FIG. 1, the train of optical pulses comprises S as a large number of signal lights and V and D as a small number of decoy pulses.
PRIOR ART DOCUMENT(S) Non-Patent Document(s)
  • Non-Patent Document 1: Bennett and Brassard, IEEE Int. Conf. on Computers, Systems, and Signal Processing, Bangalore, India, p. 175 (1984)
  • Non-Patent Document 2: N. Lutkenhaus, Physical Review A, Vol. 61, 052304 (2000)
  • Non-Patent Document 3: W. Y. Hwang, Physical Review Letters, Vol. 91, 057901 (2003)
SUMMARY OF THE INVENTION Problem to be Solved by the Invention
In a case where the decoy method is used in the quantum key distribution, it is known that, when the intensity of the optical pulses fluctuates, an amount of information leakage to an eavesdropper increases and a generation efficiency of an encryption key significantly degrades. Specifically, when the intensity of the decoy pulses D fluctuates by 5%, the generation efficiency of the encryption key degrades to about 50% in comparison with a case of no fluctuation in the decoy pulses D.
On the other hand, a recent quantum key distribution system uses a high-speed electronic circuit operable with a clock frequency exceeding 1 GHz. Since a distortion occurs in a waveform of a modulation signal, a phenomenon called a pattern effect occurs. The pattern effect is a phenomenon in which a modulation signal for a pulse changes depending on a previous modulation pattern.
FIG. 2 is a schematic view for use in describing the pattern effect, (a) shows a modulation signal in an ideal electronic circuit without the pattern effect, and (b) shows a modulation signal in a real electronic circuit with the pattern effect. In FIG. 2 (a) and FIG. 2 (b), the axis of abscissas represents a time while the axis of ordinate represents a voltage.
FIG. 2 (a) illustrates a modulation signal 201 a, a first optical pulse 202 a and a second optical pulse 203 a as optical pulses to be modulated, a first modulation signal 204 a for the first optical pulse 202 a, and a second modulation signal 205 a for the second optical pulse 203 a. As shown in FIG. 2 (a), the first modulation signal 204 a and the second modulation signal 205 a have waveforms of the same shape as each other.
FIG. 2 (b) illustrates a modulation signal 201 b, a first optical pulse 202 b and a second optical pulse 203 b as optical pulses to be modulated, a first modulation signal 204 b for the first optical pulse 202 b, and a second modulation signal 205 b for the second optical pulse 203 b. As shown in FIG. 2 (b), in the real electronic circuit, distortion occurs in the modulation signal 201 b due to band limitation of wiring and so on. Due to the distortion, when the modulation is performed on the first optical pulse 202 b and the second optical pulse 203 b as the same optical pulse, the first modulation signal 204 b and the second modulation signal 205 b as respective modulation signals thereof have waveforms which are different from each other. In FIG. 2 (b), the modulation signal changes depending on a preceding modulation pattern. Such phenomenon is called the pattern effect. Thus, in the decoy method, even if the optical pulses are subjected to the same intensity modulation, the intensity may fluctuate depending on which one of the three types has been a preceding pulse intensity. The fluctuation of the optical pulse intensity due to the pattern effect may reach about 20%. Therefore, a generation efficiency of the encryption key may possibly degrade significantly.
It is an object of this invention to provide a transmitting device, a receiving device, a quantum key distribution method, and a quantum key distribution program for a quantum key distribution system which are capable of suppressing degradation of a generation efficiency of an encryption key when a decoy method is used.
Means to Solve the Problem
A transmitting device for a quantum key distribution system according to a first aspect of the present invention comprises an encoding unit configured to encode a train of optical pulses; an intensity modulating unit configured to subject a train of encoded optical pulses to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three; and a first key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when the encoding unit and the intensity modulating unit carry out encoding and intensity modulation.
A receiving device for a quantum key distribution system according to a second aspect of the present invention comprises a decoding unit configured to receive, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, the decoding unit producing a data sequence obtained by decoding the train of optical pulses; and a second key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
A quantum key distribution method according to a third aspect of the present invention comprises generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
A quantum key distribution method according to a fourth aspect of the present invention comprises receiving, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, to produce a data sequence obtained by decoding the train of optical pulses, and generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
A quantum key distribution program according to a sixth aspect of the present invention makes a computer function as means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
A quantum key distribution program according to a sixth aspect of the present invention makes a computer function as means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence obtained by decoding a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three.
Effect of Invention
According to this invention, it is possible to suppress degradation of a generation efficiency of an encryption key when a decoy method is used.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic view for illustrating one example of a train of optical pulses transmitted according to a decoy method:
FIG. 2 is a schematic view for use in describing a pattern effect, (a) shows a modulation signal of an ideal electronic circuit, and (b) shows a modulation signal of a real electronic circuit;
FIG. 3 is a block diagram for use in explaining a concept of a quantum key distribution device of the present invention;
FIG. 4 is a block diagram for use in explaining a concept of a quantum key distribution system of the present invention;
FIG. 5 is a block diagram for illustrating a configuration of a quantum key distribution system according to an example embodiment of the present invention;
FIG. 6 is a table for illustrating an intensity, an intensity ratio, and a mixing percentage of a signal light and decoy pulses according to the example embodiment of the present invention;
FIG. 7 is a block diagram for illustrating configurations of key distillation processing units according to the example embodiment of the present invention, (a) shows a key distillation processing unit provided in a transmission-side quantum key distribution device, and (b) shows a key distillation processing unit provided in a reception-side quantum key distribution device:
FIG. 8 is a flow chart for illustrating a flow of processing up to generation of an encryption key according to the example embodiment of the present invention:
FIG. 9 is a table for illustrating an example of a pattern disposal processing method according to the example embodiment of the present invention; and
FIG. 10 is a block diagram for illustrating a configuration of an information processing apparatus configuring the key distillation processing unit according to the example embodiment of the present invention.
MODES FOR EMBODYING THE INVENTION
[Concept of the Invention]
(Quantum Key Distribution Device)
Now, a concept of the present invention w ill be described before explaining an example embodiment of the present invention. FIG. 3 is a block diagram for illustrating a configuration of a transmitting device 10 in a quantum key distribution system for use in explaining the concept of the present invention.
The transmitting device 10 comprises an encoding unit 11, an intensity modulating unit 12, and a key distillation processing unit 13. The encoding unit 11 encodes optical pulses according to a quantum key distribution protocol, for example, BB84. The intensity modulating unit 12 subjects a train of optical pulses encoded by the encoding unit 10 to N types of intensity modulation having mutually different intensities, to deliver outputs to the key distillation processing unit 13, where N represents an integer which is not less than three. Specifically, the intensity modulating unit 12 applies intensity modulation to the optical pulses in accordance with the decoy method. The key distillation processing unit 13 generates an encryption key on the basis of a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used on encoding by the encoding unit 11 and a data sequence used in the intensity modulating unit 12. Thus, the transmitting device 10 can suppress degradation of a generation efficiency of an encryption key when the decoy method is used in the quantum key distribution system.
(Quantum Key Distribution System)
Next, description will proceed to a concept of a quantum key distribution system according to the present invention. FIG. 4 is block diagram for illustrating a configuration of a quantum key distribution system 30 for use in explaining the concept of the present invention.
The quantum key distribution system 30 comprises a transmitting device 10A and a receiving device 20.
The transmitting device 10A comprises the encoding unit 11, the intensity modulating unit 12, and a first key distillation processing unit 13A. The transmitting device 10A subjects the optical pulses to processing similar to that in the above-mentioned transmitting device 10.
The receiving device 20 comprises a decoding unit 21 and a second key distillation processing unit 22. The decoding unit 21 and the intensity modulating unit 12 are connected via an optical network 40. Such an optical network 40 may comprise an optical fiber or the like. In this case, the decoding unit 21 receives, via the optical network 40, the train of optical pulses which has been encoded and subjected to the intensity modulation and decodes the train of optical pulses. The second key distillation processing unit 22 and the first key distillation processing unit 13A are connected via a communication network 50. Such a communication network 50 may comprise a normal Internet network or the like. The first key distillation processing unit 13A and the second key distillation processing unit 22 carry out, via the transmission network 50, transmission and reception of necessary information for generating the encryption key. The necessary information for generating the encryption key comprises information related to random number data used when the train of optical pulses is subjected to the encoding and the intensity modulation, information related to a basis used for measurement of the train of optical pulses, and the like. Consequently, the second key distillation processing unit 22 receives, from the first key distillation processing unit 13A, the necessary information for generating the encryption key. The second key distillation processing unit 22 generates, based on the information received from the decoding unit 21 and the information received from the first key distillation processing unit 13A, the encryption key on the basis of a data sequence obtained by removing data obtained from the optical pulses having the specific modulation pattern from a data sequence of a train of optical pulses which has been decoded by the decoding unit 21.
Example Embodiment
Now, an example embodiment of the present invention will be described in detail with reference to the drawings. Herein, description will be simplified or omitted as appropriate about configurations and operations having a weak relationship to the present invention.
FIG. 5 is a block diagram for illustrating a configuration of the quantum key distribution system according to an example embodiment of the present invention. As shown in FIG. 5, the quantum key distribution system 100 comprises a transmitting device 110 and a receiving device 120. Each of unidirectional arrows in FIG. 5 simply depicts a direction of flow of a signal (data) without excluding bidirectionality.
At first, the transmitting device 110 will be described. The transmitting device 110 comprises an optical source unit 111, an encoding unit 112, a decoy modulating unit 113, an optical attenuating unit 114, and a first key distillation processing unit 115.
The optical source unit 111 comprises, for example, a semiconductor laser and supplies the encoding unit 112 with optical pulses having any desired wavelength and intensity.
The encoding unit 112 encodes the optical pulses supplied from the optical source unit 111 in accordance with the quantum key distribution protocol. Herein, the quantum key distribution protocol comprises, for example, a BB84 protocol. In the example embodiment, the encoding unit 112 comprises, for example, a Mach-Zehnder interferometer and a phase modulator.
The decoy modulating unit 113 subjects the optical pulses received from the encoding unit 112 to the total three types of intensity modulation having mutually different intensities of a signal light S, a decoy pulse D and a decoy pulse V to produce a train of optical pulses comprising a plurality of optical pulses which have been subjected to the intensity modulation. As the decoy modulating unit 113 mentioned above, for example, an LN (Lithium Niobate) intensity modulator comprising a combination of a Mach-Zehnder interferometer and a phase modulator may be used.
Referring now to FIG. 6, description will proceed to an intensity, an intensity ratio, and a mixing percentage of each of S, D, and V according to the example embodiment. FIG. 6 is a table showing an example of the intensity, the intensity ratio, and the mixing percentage of each of S, D, and V according to the example embodiment.
In the example embodiment, it is assumed that S has the intensity of 1. In this event, D and V have the intensities of 0.4 and 0, respectively. The train of optical pulses includes S at a percentage of 90%, D at a percentage of 5%, and V at a percentage of 5%. That is, in the example embodiment, 90% of the train of optical pulses is used as the signal light while remaining 10% thereof is used as the decoy pulses. The intensity, the intensity ratio, and the mixing percentage of each of S, D, and V shown in FIG. 6 are one example, and the present invention is not limited thereto.
FIG. 5 is referred again. The optical attenuating unit 114 attenuates the train of optical pulses supplied from the decoy modulating unit 113 to a suitable optical intensity in order to transmit the train of the optical pulses to the receiving device 120. Such an optical attenuating unit 114 may comprise, for example, a variable optical attenuator. An attenuation amount in the optical attenuating unit 114 is preliminarily set according to a design of the quantum key distribution system 100 but may be adjusted appropriately. The optical attenuating unit 114 may comprise, for example, an optical detecting unit. In this event, the optical attenuating unit 114 may adjust the attenuation amount in accordance with an intensity of pulses detected by the optical detecting unit.
The first key distillation processing unit 115 generates a first encryption key 150 a as an encryption key in the transmitting device 110. The first key distillation processing unit 115 receives, from the encoding unit 112 and the decoy modulating unit 113, information (random number data or the like) used on encoding and on the intensity modulation, respectively. A configuration of the first key distillation processing unit 115 and details of processing for generating the first encryption key 150 a will later be described.
Next, description will proceed to the receiving device 120. The receiving device 120 comprises a decoding unit 121, an optical detecting unit 122, and a second key distillation processing unit 123. The decoding unit 121 and the optical attenuating unit 114 of the transmitting device 110 are connected via an optical network 130 which comprises an optical fiber or the like. The second key distillation processing unit 123 and the first key distillation processing unit 115 of the transmitting device 110 are connected via a communication network 140 such as a normal Internet network.
The decoding unit 121 receives the train of optical pulses from the transmitting device 110 via the optical network 130 and decodes the train of optical pulses through a process inverse to the method used on encoding by the encoding unit 112.
In response to the train of optical pulses which has been decoded, the optical detecting unit 122 measures information of a photon number with respect to the train of optical pulses which has been received and delivers measured data to the second key distillation processing unit 123.
The second key distillation processing unit 123 generates a second encryption key 150 b as an encryption key in the receiving device 120. Herein, the second encryption key 150 b is the same encryption key as the first encryption key 150 a generated by the first key distillation processing unit 115. A configuration of the second key distillation processing unit 123 and processing for generating the second encryption key 150 b will later be described.
Next, description will be made in detail about the configurations of the first key distillation processing unit 115 and the second key distillation processing unit 123 and processing for generating the encryption key.
The first key distillation processing unit 115 generates a sifted key based on random number data used on the encoding and the decoy modulation of the optical pulses. The second key distillation processing unit 123 generates a sifted key based on detected data detected by the optical detecting unit 122 after decoding. The first key distillation processing unit 115 and the second key distillation processing unit 123 generate the first encryption key 150 a and the second encryption key 150 b, each of which is finally safe, respectively, by subjecting the sifted key to error correction and privacy amplification. The first key distillation processing unit 115 and the second key distillation processing unit 123 mutually transmit and receive, via the communication network 140, the necessary information, possessed by the respective units, for generating the encryption key. Normally, the quantum key distribution system generates the encryption key based on the sifted key which is generated in accordance with a result obtained by verifying a basis selected at a transmitting side and a receiving side. However, this example embodiment is characterized by further performing, after generating the sifted key in accordance with the result obtained by verifying the basis, processing in which data obtained from the optical pulses of a specific modulation pattern are disposed of from the sifted key without being used for generating the encryption key (pattern disposal processing).
FIG. 7 is a block diagram for illustrating configurations of key distillation processing units according to the example embodiment of the present invention. (a) shows the configuration of the first key distillation processing unit 115, and (b) shows the configuration of the second key distillation processing unit 123. Each of unidirectional arrows in FIG. 7 simply depicts a direction of flow of a signal (data) without excluding bidirectionality.
As shown in FIG. 7 (a), the first key distillation processing unit 115 comprises a first basis verifying portion 115 a, a first pattern disposal processing portion 115 b, and a first encryption key generating portion 115 c. As shown in FIG. 7 (b), the second key distillation processing unit 123 comprises a second basis verifying portion 123 a, a second pattern disposal processing portion 123 b, and a second encryption key generating portion 123 c.
FIG. 8 is a flow chart for illustrating a flow of processing in which the first key distillation processing unit 115 and the second key distillation processing unit 123 according to the example embodiment generate the encryption keys.
Referring now to FIGS. 7 and 8, description will be made in detail about the processing of generating the encryption keys by the first key distillation processing unit 115 and the second key distillation processing unit 123.
First of all, the first basis verifying portion 115 a and the second basis verifying unit portion 123 a transmit and receive information of the bases used by these portions, respectively. Each of the first basis verifying portion 115 a and the second basis verifying portion 123 a generates a first sifted key in accordance with a result obtained by verifying the basis (step S101).
Subsequently, the first pattern disposal processing portion 115 b and the second pattern disposal processing portion 123 b generate a second sifted key by subjecting the first sifted key to the pattern disposal processing (step S102). In this event, the second key distillation processing unit 123 receives, from the first key distillation processing unit 115 via the communication network 140, decoy information (random number data) used when the decoy modulating unit 113 carries out the intensity modulation. Thus, the second pattern disposal processing portion 123 b can subject the first sifted key to processing similar to that in the first pattern disposal processing portion 115 b and can generate the second sifted key.
Referring now to FIG. 9, description will be made about, as one example of the pattern disposal processing according to the example embodiment, an example where the influence of the pattern effect is removed when the intensity fluctuation is large due to the pattern effect of the decoy pulse D. FIG. 9 is a table showing an example of the optical pulses to which the pattern disposal processing is applied. In FIG. 9, for example, D→S means the signal light S which is transmitted immediately after the decoy pulse D. Specifically, in the example illustrated in FIG. 9, among the decoy pulses D, the decoy pulse D (S→D) transmitted immediately after the signal light S is used while the decoy pulses D (D→D and V→D) transmitted immediately after the decoy pulse D and the decoy pulse V are disposed of without being used. Consequently, any signal immediately before the decoy pulse D is fixed to the signal light S. Therefore, it is possible to substantially remove the influence of the pattern effect even if the pattern effect of the decoy pulse D is large. This is because the modulation signal changes in dependence upon the preceding modulation pattern due to the pattern effect as described above.
FIGS. 7 and 8 are referred to again. The first encryption key generating portion 115 c calculates an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key (step S103). Specifically, the first encryption key generating portion 115 c receives, via the communication network 140, information of at least a part of the second sifted key generated by the second pattern disposal processing portion 123 b. Then, the first encryption key generating portion 115 c calculates the error rate by comparing the second sifted keys which are generated at the transmitting side and the receiving side.
Finally, the first encryption key generating portion 115 c and the second encryption key generating portion 123 c generate safe encryption keys by subjecting the second sifted keys to the error correction and the privacy amplification based on the error rate.
Although the pattern disposal processing is carried out after the basis is verified in the example embodiment of the present invention, the present invention is not limited thereto. In the present invention, the encryption key may be generated by verifying the basis after carrying out the pattern disposal processing.
In the example embodiment of the present invention, the number of acquired data decreases because the pattern disposal processing portions dispose of a part of pulses. However, a percentage of patterns D→D and V→D disposed of in the above-mentioned example with respect to the transmission pulses is equal to 5%×5%+5%×5%=0.5% as calculated from the transmission percentage illustrated in FIG. 6. Therefore, even if the patterns D→D and V→D are disposed of, the influence on the number of data as a whole is small. Accordingly, by the above-mentioned method, it is possible to substantially remove the pattern effect and to avoid the degradation of the generation efficiency of the encryption key.
The present invention is not limited to the decoy method using three types of intensities, but may be applicable to a case where four or more types of intensities are used. In addition, the present invention is not limited to only the pattern effect due to preceding modulation, but may be applicable to a case where the pattern effect occurs due to second or more preceding modulation or due to first or more succeeding modulation. In other words, the present invention may be applicable to a case where there are a current optical pulse and the pattern effect due to modulation occurs on an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M represents an integer which is not less than one.
Other Example Embodiments
In the quantum key distribution system, the first key distillation processing unit 115 and the second key distillation processing unit 123 may be implemented by hardware or may be implemented by software. In addition, the first key distillation processing unit 115 and the second key distillation processing unit 123 may be implemented by a combination of hardware and software.
FIG. 10 is one example of an information processing apparatus (computer) constituting the first key distillation processing unit 115 and the second key distillation processing unit 123.
As shown in FIG. 10, the information processing apparatus 300 comprises a control unit 310, a storage device 320, an ROM (Read Only Memory) 330, an RAM (Random Access Memory) 340, and a communication interface 350.
The control unit 310 may comprise a processing unit such as a CPU (Central Processing Unit). The control unit 310 may implement respective portions constituting the first key distillation processing unit 115 and the second key distillation processing unit 123 by developing a program, which is held in the storage device 320 or the ROM 330 and which is readable by the control unit 310, in the RAM 340 and by executing the program. In addition, the control unit 310 may comprise an internal buffer which is adapted to temporarily store data or the like.
The storage device 320 comprises a bulk storage medium which can hold various types of data and may be implemented by a storage medium such as a magneto-optical disc, an HDD (Hard Disk Drive), and an SSD (Solid State Drive). The storage device 320 may be a cloud storage existing in a communication network when the information processing apparatus 300 is connected to a communication network via the communication interface 350. The storage device 320 may hold the program readable by the control unit 310.
The ROM 330 comprises a nonvolatile storage device which may comprise a flash memory having a small capacity as compared to the storage device 320. The ROM 330 may hold a program which is readable by the control unit 310. The program readable by the control unit 310 may be held in at least one of the storage device 320 and the ROM 330.
The RAM 340 comprises a semiconductor memory such as a DRAM (Dynamic Random Access Memory) and an SRAM (Static Random Access Memory) and may be used as an internal buffer which temporarily stores data and so on.
The communication interface 350 is an interface which connects the information processing apparatus 300 and the communication network via wire or wirelessly.
A part or a whole of the example embodiments described above may also be described as the following supplementary notes. It is noted that the following supplementary notes never limit the present invention.
(Supplementary Note 1)
A transmitting device for a quantum key distribution system, comprising:
an encoding unit configured to encode a train of optical pulses;
an intensity modulating unit configured to subject a train of encoded optical pulses to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three; and
a first key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when the encoding unit and the intensity modulating unit carry out encoding and intensity modulation.
(Supplementary Note 2)
The transmitting device according to Supplementary Note 1, wherein the first key distillation processing unit is configured to determine data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
(Supplementary Note 3)
The transmitting device according to Supplementary Note 1 or 2, wherein the first key distillation processing unit includes a decoy pulse as the modulation pattern and is configured to dispose of data having large intensity fluctuation.
(Supplementary Note 4)
The transmitting device according to any one of Supplementary Notes 1 to 3, wherein the first key distillation processing unit is configured to dispose of at least data having the largest intensity fluctuation due to a pattern effect.
(Supplementary Note 5)
The transmitting device according to any one of Supplementary Notes 1 to 4,
wherein the first key distillation processing unit comprises a first basis verification processing portion, a first pattern disposal processing portion, and a first encryption key generating portion,
wherein the first basis verification processing portion is configured to generate a first sifted key based on a basis which is given to the data sequence of the train of optical pulses,
wherein the first pattern disposal processing portion is configured to generate a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern,
wherein the first encryption key generating portion is configured to generate the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
(Supplementary Note 6)
A receiving device for a quantum key distribution system, comprising:
a decoding unit configured to receive, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, the decoding unit producing a data sequence obtained by decoding the train of optical pulses: and
a second key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
(Supplementary Note 7)
The receiving device according to Supplementary Note 6, wherein the second key distillation processing unit is configured to determine data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
(Supplementary Note 8)
The receiving device according to Supplementary Note 6 or 7, wherein the second key distillation processing unit includes a decoy pulse as the modulation pattern and is configured to dispose of data having large intensity fluctuation.
(Supplementary Note 9)
The receiving device according to any one of Supplementary Notes 6 to 8, wherein the second key distillation processing unit is configured to dispose of at least data having the largest intensity fluctuation due to a pattern effect.
(Supplementary Note 10)
The receiving device according to any one of Supplementary Notes 6 to 9,
wherein the second key distillation processing unit comprises a second basis verification processing portion, a second pattern disposal processing portion, and a second encryption key generating portion,
wherein the second basis verification processing portion is configured to generate a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses,
wherein the second pattern disposal processing portion is configured to generate a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern,
wherein the second encryption key generating portion is configured to generate the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
(Supplementary Note 11)
A quantum key distribution method comprising generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
(Supplementary Note 12)
The quantum key distribution method according to Supplementary Note 11, comprising determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
(Supplementary Note 13)
The quantum key distribution method according to Supplementary Note 11 or 12, comprising including a decoy pulse as the modulation pattern: and disposing of data having large intensity fluctuation.
(Supplementary Note 14)
The quantum key distribution method according to any one of Supplementary Notes 11 to 13, comprising disposing of at least data having the largest intensity fluctuation due to a pattern effect.
(Supplementary Note 15)
The quantum key distribution method according to any one of Supplementary Notes 11 to 14, comprising:
generating a first sifted key based on a basis which is given to the data sequence of the train of optical pulses:
generating a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern; and
generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
(Supplementary Note 16)
A quantum key distribution method comprising:
receiving, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, to produce a data sequence obtained by decoding the train of optical pulses: and
generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
(Supplementary Note 17)
The quantum key distribution method according to Supplementary Note 16, comprising determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
(Supplementary Note 18)
The quantum key distribution method according to Supplementary Note 16 or 17, comprising including a decoy pulse as the modulation pattern; and disposing of data having large intensity fluctuation.
(Supplementary Note 19)
The quantum key distribution method according to any one of Supplementary Notes 16 to 18, comprising disposing of at least data having the largest intensity fluctuation due to a pattern effect.
(Supplementary Note 20)
The quantum key distribution method according to any one of Supplementary Notes 16 to 19, comprising:
generating a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses:
generating a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern: and
generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
(Supplementary Note 21)
A quantum key distribution program for making a computer function as:
means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
(Supplementary Note 22)
The quantum key distribution program according to Supplementary Note 21, making the computer function as:
means for determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
(Supplementary Note 23)
The quantum key distribution program according to Supplementary Note 21 or 22, making the computer function as:
means for including a decoy pulse as the modulation pattern and disposing of data having large intensity fluctuation.
(Supplementary Note 24)
The quantum key distribution program according to any one of Supplementary Notes 21 to 23, making the computer function as:
means for disposing of at least data having the largest intensity fluctuation due to a pattern effect.
(Supplementary Note 25)
The quantum key distribution program according to any one of Supplementary Notes 21 to 24, making the computer function as:
means for generating a first sifted key based on a basis which is given to the data sequence of the train of optical pulses;
means for generating a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern: and
means for generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
(Supplementary Note 26)
A quantum key distribution program for making a computer function as:
means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence obtained by decoding a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three.
(Supplementary Note 27)
The quantum key distribution program according to Supplementary Note 26, making the computer function as:
means for determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
(Supplementary Note 28)
The quantum key distribution program according to Supplementary Note 26 or 27, making the computer function as:
means for including a decoy pulse as the modulation pattern and disposing of data having large intensity fluctuation.
(Supplementary Note 29)
The quantum key distribution program according to any one of Supplementary Notes 26 to 28, making the computer function as:
means for disposing of at least data having the largest intensity fluctuation due to a pattern effect.
(Supplementary Note 30)
The quantum key distribution program according to any one of Supplementary Notes 26 to 29, making the computer function as:
means for generating a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses;
means for generating a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern; and
means for generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
(Supplementary Note 31)
A quantum key distribution system comprising:
a transmitting device for the quantum key distribution system according to any one of Supplementary Notes 1 to 5; and
a receiving device for the quantum key distribution system according to any one of Supplementary Notes 6 to 10.
EXPLANATION OF REFERENCE SIGNS
    • 10, 10A, 110 transmitting device
    • 11 encoding unit
    • 12 intensity modulating unit
    • 13 key distillation processing unit
    • 13A first key distillation processing unit
    • 20, 120 receiving device
    • 21 decoding unit
    • 22 second distillation processing unit
    • 30, 100 quantum key distribution system
    • 40 optical network
    • 50 communication network
    • 111 optical source unit
    • 112 encoding unit
    • 113 decoy modulating unit
    • 114 optical attenuating unit
    • 115 first key distillation processing unit
    • 115 a first basis verifying portion
    • 115 b first pattern disposal processing portion
    • 115 c first encryption key generating portion
    • 121 decoding unit
    • 122 optical detecting unit
    • 123 second key distillation processing unit
    • 123 a second basis verifying portion
    • 123 b second pattern disposal processing portion
    • 123 c second encryption key generating portion
    • 130 optical network
    • 140 communication network
    • 150 a first encryption key
    • 150 b second encryption key
    • 201 a, 201 b modulation signal
    • 202 a. 202 b first optical pulse
    • 203 a, 203 b second optical pulse
    • 204 a. 204 b first modulation signal
    • 205 a, 205 b second modulation signal
    • 300 information processing apparatus
    • 310 control unit
    • 320 storage device
    • 330 ROM (Read Only Memory)
    • 340 RAM (Random Access Memory)
    • 350 communication interface

Claims (29)

The invention claimed is:
1. A transmitting device for a quantum key distribution system, comprising:
an encoding unit configured to encode a train of optical pulses;
an intensity modulating unit configured to subject a train of encoded optical pulses to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three; and
a first key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when the encoding unit and the intensity modulating unit carry out encoding and intensity modulation.
2. The transmitting device as claimed in claim 1, wherein the first key distillation processing unit is configured to determine data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
3. The transmitting device as claimed in claim 1, wherein the first key distillation processing unit includes a decoy pulse as the modulation pattern and is configured to dispose of data having large intensity fluctuation.
4. The transmitting device as claimed in claim 1, wherein the first key distillation processing unit is configured to dispose of at least data having the largest intensity fluctuation due to a pattern effect.
5. The transmitting device as claimed in claim 1,
wherein the first key distillation processing unit comprises a first basis verification processing portion, a first pattern disposal processing portion, and a first encryption key generating portion,
wherein the first basis verification processing portion is configured to generate a first sifted key based on a basis which is given to the data sequence of the train of optical pulses,
wherein the first pattern disposal processing portion is configured to generate a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern,
wherein the first encryption key generating portion is configured to generate the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
6. A receiving device for a quantum key distribution system, comprising:
a decoding unit configured to receive, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, the decoding unit producing a data sequence obtained by decoding the train of optical pulses; and
a second key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
7. The receiving device as claimed in claim 6, wherein the second key distillation processing unit is configured to determine data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
8. The receiving device as claimed in claim 6, wherein the second key distillation processing unit includes a decoy pulse as the modulation pattern and is configured to dispose of data having large intensity fluctuation.
9. The receiving device as claimed in claim 6, wherein the second key distillation processing unit is configured to dispose of at least data having the largest intensity fluctuation due to a pattern effect.
10. The receiving device as claimed in claim 6,
wherein the second key distillation processing unit comprises a second basis verification processing portion, a second pattern disposal processing portion, and a second encryption key generating portion,
wherein the second basis verification processing portion is configured to generate a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses,
wherein the second pattern disposal processing portion is configured to generate a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern,
wherein the second encryption key generating portion is configured to generate the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
11. A quantum key distribution method comprising generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three.
12. The quantum key distribution method as claimed in claim 11, comprising determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
13. The quantum key distribution method as claimed in claim 11, comprising including a decoy pulse as the modulation pattern; and disposing of data having large intensity fluctuation.
14. The quantum key distribution method as claimed in claim 11, comprising disposing of at least data having the largest intensity fluctuation due to a pattern effect.
15. The quantum key distribution method as claimed in claim 11, comprising:
generating a first sifted key based on a basis which is given to the data sequence of the train of optical pulses;
generating a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern; and
generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
16. A quantum key distribution method comprising:
receiving, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, to produce a data sequence obtained by decoding the train of optical pulses; and
generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
17. The quantum key distribution method as claimed in claim 16, comprising determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
18. The quantum key distribution method as claimed in claim 16, comprising including a decoy pulse as the modulation pattern; and disposing of data having large intensity fluctuation.
19. The quantum key distribution method as claimed in claim 16, comprising disposing of at least data having the largest intensity fluctuation due to a pattern effect.
20. The quantum key distribution method as claimed in claim 16, comprising:
generating a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses;
generating a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern; and
generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
21. A non-transitory computer readable medium for storing a quantum key distribution program for making a computer function as:
means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when a train of optical pulses are subjected to encoding and N types of intensity modulation having mutually different intensities, where N is an integer which is not less than three; and
means for determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
22. The non-transitory computer readable medium as claimed in claim 21, the quantum key distribution program making the computer function as:
means for including a decoy pulse as the modulation pattern and disposing of data having large intensity fluctuation.
23. The non-transitory computer readable medium as claimed in claim 21, the quantum key distribution program making the computer function as:
means for disposing of at least data having the largest intensity fluctuation due to a pattern effect.
24. The non-transitory computer readable medium as claimed in claim 21, the quantum key distribution program making the computer function as:
means for generating a first sifted key based on a basis which is given to the data sequence of the train of optical pulses;
means for generating a second sifted key from the first sifted key based on a data sequence obtained by removing, from the data sequence of the train of optical pulses, data obtained from a train of optical pulses having the specific modulation pattern; and
means for generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
25. A non-transitory computer readable medium for storing a quantum key distribution program for making a computer function as:
means for generating an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence obtained by decoding a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three; and
means for determining data to be removed among the train of optical pulses based on data obtained from a current optical pulse and data obtained from an M-th preceding or an M-th succeeding optical pulse preceding or succeeding the current optical pulse, where M is an integer which is not less than one.
26. The non-transitory computer readable medium as claimed in claim 25, the quantum key distribution program making the computer function as:
means for including a decoy pulse as the modulation pattern and disposing of data having large intensity fluctuation.
27. The non-transitory computer readable medium as claimed in claim 25, the quantum key distribution program making the computer function as:
means for disposing of at least data having the largest intensity fluctuation due to a pattern effect.
28. The non-transitory computer readable medium as claimed in claim 25, the quantum key distribution program making the computer function as:
means for generating a first sifted key by randomly selecting a basis which is given to the data sequence of the train of optical pulses;
means for generating a second sifted key based on a data sequence obtained by removing, from the first sifted key, data obtained from a train of optical pulses having the specific modulation pattern; and
means for generating the encryption key by calculating an error rate (QBER: Quantum Bit Error Rate) included in the second sifted key and by carrying out error correction and privacy amplification on the second sifted key based on the error rate.
29. A quantum key distribution system comprising:
a transmitting device; and
a receiving device,
wherein the transmitting device comprises:
an encoding unit configured to encode a train of optical pulses;
an intensity modulating unit configured to subject a train of encoded optical pulses to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three; and
a first key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from a data sequence used when the encoding unit and the intensity modulating unit carry out encoding and intensity modulation,
wherein the receiving device comprises:
a decoding unit configured to receive, from a transmitting device, a train of optical pulses which has been encoded and subjected to N types of intensity modulation having mutually different intensities, with different timings, where N is an integer which is not less than three, the decoding unit producing a data sequence obtained by decoding the train of optical pulses; and
a second key distillation processing unit configured to generate an encryption key based on a data sequence obtained by removing data obtained from optical pulses having a specific modulation pattern from the data sequence obtained by the decoding.
US16/331,685 2016-09-09 2017-08-31 Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system Active 2040-03-10 US11502831B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2016-176364 2016-09-09
JPJP2016-176364 2016-09-09
JP2016176364 2016-09-09
PCT/JP2017/031456 WO2018047716A1 (en) 2016-09-09 2017-08-31 Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system

Publications (2)

Publication Number Publication Date
US20190245685A1 US20190245685A1 (en) 2019-08-08
US11502831B2 true US11502831B2 (en) 2022-11-15

Family

ID=61561801

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/331,685 Active 2040-03-10 US11502831B2 (en) 2016-09-09 2017-08-31 Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system

Country Status (5)

Country Link
US (1) US11502831B2 (en)
EP (1) EP3512158B1 (en)
JP (1) JP7002713B2 (en)
CN (1) CN109691011B (en)
WO (1) WO2018047716A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2504996A1 (en) * 2009-11-25 2012-10-03 Thirel B.V. Card sharing countermeasures
AU2016302005B2 (en) 2015-08-05 2021-03-04 Metro International Biotech, Llc Nicotinamide mononucleotide derivatives and their uses
GB2542881B (en) 2015-10-02 2020-01-01 Carr Andrew Crystal forms of ß-nicotinamide mononucleotide
CN108737082B (en) * 2017-04-24 2020-11-17 华为技术有限公司 Signal receiving device and receiving method
WO2019152416A1 (en) 2018-01-30 2019-08-08 Metro International Biotech, Llc Nicotinamide riboside analogs, pharmaceutical compositions, and uses thereof
CN109687964B (en) * 2019-02-19 2021-06-04 中国电子科技集团公司第三十研究所 Novel data coordination method for continuous variable quantum key distribution
US11939348B2 (en) 2019-03-22 2024-03-26 Metro International Biotech, Llc Compositions comprising a phosphorus derivative of nicotinamide riboside and methods for modulation of nicotinamide adenine dinucleotide
US10618927B1 (en) 2019-03-22 2020-04-14 Metro International Biotech, Llc Compositions and methods for modulation of nicotinamide adenine dinucleotide
CN110704823A (en) * 2019-09-10 2020-01-17 平安科技(深圳)有限公司 Data request method, device, storage medium and electronic equipment
JP7388700B2 (en) * 2019-12-25 2023-11-29 国立研究開発法人情報通信研究機構 Private key sharing method and system
WO2021250829A1 (en) * 2020-06-10 2021-12-16 日本電気株式会社 Optical transmitter and modulation timing correctness/incorrectness determination method
WO2022251491A1 (en) 2021-05-27 2022-12-01 Metro International Biotech, Llc Crystalline solids of nicotinic acid mononucleotide and esters thereof and methods of making and use
CN117879818B (en) * 2024-03-12 2024-05-10 正则量子(北京)技术有限公司 Quantum key distribution method and device based on mode pairing

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010114488A (en) 2008-11-04 2010-05-20 Oki Electric Ind Co Ltd Optical code division multiplex signal generator
US20140105598A1 (en) 2012-10-12 2014-04-17 Kabushiki Kaisha Toshiba System and method for intensity monitoring
US8718485B2 (en) 2007-07-13 2014-05-06 Nec Corporation Quantum key distribution system, optical transmitter, optical modulation control circuit, and optical modulation control method
CN104468097A (en) 2015-01-13 2015-03-25 中国人民解放军理工大学 Security data communication achieving method based on quantum key distribution
JP2015122675A (en) 2013-12-25 2015-07-02 日本電気株式会社 Modulation device and modulation method
US20150304106A1 (en) * 2012-11-01 2015-10-22 Nec Corporation Optical receiving device in optical communication system, control method and device of photon detector, and dark count evaluation method of photon detector
US20180269989A1 (en) * 2017-03-17 2018-09-20 Kabushiki Kaisha Toshiba Transmission device, multi-quantum communication system, and multi-quantum communication method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8718485B2 (en) 2007-07-13 2014-05-06 Nec Corporation Quantum key distribution system, optical transmitter, optical modulation control circuit, and optical modulation control method
JP2010114488A (en) 2008-11-04 2010-05-20 Oki Electric Ind Co Ltd Optical code division multiplex signal generator
US20100215370A1 (en) 2008-11-04 2010-08-26 Oki Electric Industry Co., Ltd. Optical code division multiplex signal generator
US20140105598A1 (en) 2012-10-12 2014-04-17 Kabushiki Kaisha Toshiba System and method for intensity monitoring
JP2014131259A (en) 2012-10-12 2014-07-10 Toshiba Corp System and method for intensity monitoring
US20150304106A1 (en) * 2012-11-01 2015-10-22 Nec Corporation Optical receiving device in optical communication system, control method and device of photon detector, and dark count evaluation method of photon detector
JP2015122675A (en) 2013-12-25 2015-07-02 日本電気株式会社 Modulation device and modulation method
CN104468097A (en) 2015-01-13 2015-03-25 中国人民解放军理工大学 Security data communication achieving method based on quantum key distribution
US20180269989A1 (en) * 2017-03-17 2018-09-20 Kabushiki Kaisha Toshiba Transmission device, multi-quantum communication system, and multi-quantum communication method

Non-Patent Citations (11)

* Cited by examiner, † Cited by third party
Title
Charles H. Bennett, "Quantum Cryptography: Public Key Distribution and Coin Tossing", International Conference on Computers, Systems & Signal Processing, Dec. 9-12, 1984, 7 pages, Bangalore, India.
Communication dated Jul. 30, 2021, from the China National Intellectual Property Administration in application No. 201780055436.2.
Communication dated Mar. 30, 2020 from the European Patent Office in application No. 17848656.9.
Communication dated Sep. 15, 2021 by the Japanese Patent Office in Japanese Application No. 2018-538385.
HAODONG JIANG; MING GAO; HONG WANG; HONGXIN LI; ZHI MA: "Four-intensity Decoy-state Quantum Key Distribution with Enhanced Resistance against Statistical Fluctuation", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 8 February 2015 (2015-02-08), 201 Olin Library Cornell University Ithaca, NY 14853 , XP080677317
Haodong, J., et al., "Four-intensity Decoy-state Quantum Key Distribution with Enhanced Resistance against Statistical Fluctuation", ARXIV.org, Cornell University Library, Ithaca, NY, Feb. 8, 2015, XP080677317, 19 pages.
International Search Report for PCT/JP2017/031456, dated Nov. 14, 2017.
Norbert Lukenhaus, "Security against individual attacks for realistic quantum key distribution", Physical Review A, 2000, pp. 052304-1-052304-10, vol. 61, 052304.
Won-Young-Hwang, "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Physical Review Letters, Aug. 1, 2003, pp. 057901-1-057901-4, vol. 91, No. 5.
Written Opinion for PCT/JP2017/031456, dated Nov. 14, 2017.
Yuichi Nagamatsu et al., "Security of quantum key distribution with non-I.I.D. light sources", Phys. Rev. A 93, 042325, Quantum Physics (quant-ph), 2016, pp. 1-10, Retrieved from URL:<https://arxiv.org/pdf/1602.02914.pdf> (10 pages total).

Also Published As

Publication number Publication date
JP7002713B2 (en) 2022-01-20
JPWO2018047716A1 (en) 2019-09-05
CN109691011B (en) 2022-06-14
WO2018047716A1 (en) 2018-03-15
US20190245685A1 (en) 2019-08-08
CN109691011A (en) 2019-04-26
EP3512158A1 (en) 2019-07-17
EP3512158A4 (en) 2020-04-29
EP3512158B1 (en) 2021-08-18

Similar Documents

Publication Publication Date Title
US11502831B2 (en) Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system
JP6602410B2 (en) Photon communication system
CN107113169B (en) Permanent secure communications from short-term secure encrypted quantum communications
US11362817B2 (en) Quantum cryptographic key output apparatus, quantum cryptographic key communication system, and quantum cryptographic key output method
JP6681081B2 (en) Random number sequence generation device, quantum cryptographic transmitter, and quantum cryptographic communication system
JP5558579B2 (en) Quantum communication system and method
US7934132B2 (en) Communication system and method for controlling the same
US8867742B2 (en) Optical transmission device and reception device for Yuen encryption, optical transmission method and reception method for Yuen encryption, and encrypted communication system
CN106254072B (en) Quantum key distribution method
CN113141252B (en) Quantum key distribution method, quantum communication method, device and system
KR20150031245A (en) Secure communication
CN107682144B (en) Continuous variable key distribution method based on bi-phase modulation and data post-processing
US20040190719A1 (en) Decoupling error correction from privacy amplification in quantum key distribution
JP2010114662A (en) Optical transmission device and method
CN110768794A (en) Quantum key distribution method based on label pairing coherent state and quantum storage
CN114285548A (en) Decoy MDI-QKD method and system based on phase post-selection
US7606367B2 (en) Quantum cryptography with fewer random numbers
KR20220045910A (en) Method, apparatus, computer program and data carrier for determining a shared secret cryptographic key
JP6257042B2 (en) Quantum key distribution system and quantum key distribution method
JP5062642B2 (en) ENCRYPTED OPTICAL TRANSMITTING DEVICE AND RECEIVING DEVICE, ENCRYPTED OPTICAL TRANSMITTING METHOD AND RECEIVING METHOD, AND ENCRYPTED COMMUNICATION SYSTEM
CN111865577B (en) Quantum key distribution method and quantum communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: NATIONAL UNIVERSITY CORPORATION HOKKAIDO UNIVERSITY, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOSHINO, KEN-ICHIRO;FUJIWARA, MIKIO;SASAKI, MASAHIDE;AND OTHERS;SIGNING DATES FROM 20181218 TO 20190111;REEL/FRAME:048549/0192

Owner name: NATIONAL INSTITUTE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOSHINO, KEN-ICHIRO;FUJIWARA, MIKIO;SASAKI, MASAHIDE;AND OTHERS;SIGNING DATES FROM 20181218 TO 20190111;REEL/FRAME:048549/0192

Owner name: NEC CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOSHINO, KEN-ICHIRO;FUJIWARA, MIKIO;SASAKI, MASAHIDE;AND OTHERS;SIGNING DATES FROM 20181218 TO 20190111;REEL/FRAME:048549/0192

Owner name: NATIONAL INSTITUTE OF INFORMATION AND COMMUNICATIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOSHINO, KEN-ICHIRO;FUJIWARA, MIKIO;SASAKI, MASAHIDE;AND OTHERS;SIGNING DATES FROM 20181218 TO 20190111;REEL/FRAME:048549/0192

Owner name: NATIONAL UNIVERSITY CORPORATION HOKKAIDO UNIVERSIT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOSHINO, KEN-ICHIRO;FUJIWARA, MIKIO;SASAKI, MASAHIDE;AND OTHERS;SIGNING DATES FROM 20181218 TO 20190111;REEL/FRAME:048549/0192

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STCF Information on status: patent grant

Free format text: PATENTED CASE